Description
In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: ipc4-topology: Correct the allocation size for bytes controls

The size of the data behind of scontrol->ipc_control_data for bytes
controls is:
[1] sizeof(struct sof_ipc4_control_data) + // kernel only struct
[2] sizeof(struct sof_abi_hdr)) + payload

The max_size specifies the size of [2] and it is coming from topology.

Change the function to take this into account and allocate adequate amount
of memory behind scontrol->ipc_control_data.

With the change we will allocate [1] amount more memory to be able to hold
the full size of data.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel, a mismatch in the calculated allocation size for bytes controls in the SOF IPC4 topology caused the data structure behind scontrol->ipc_control_data to be incorrectly sized. This error could lead to a heap-based buffer overflow or memory corruption when the kernel processes control data that exceeds the originally allocated space. The impact is the potential compromise of kernel memory integrity, which could, in turn, allow privilege escalation or denial of service.

Affected Systems

The vulnerability affects the Linux kernel, specifically when the SOF (Sound Open Firmware) IPC4 topology functionality is enabled. No specific kernel versions are listed, so all Linux kernels that include the affected code path may be impacted until the patch is applied.

Risk and Exploitability

The CVSS score is not provided, and the EPSS score is unavailable, so the inherent exploitation probability cannot be quantified from the CVE data. The vulnerability is not listed in the CISA KEV catalog. However, because the flaw involves a heap-based buffer overflow in kernel space, the potential for exploitation is considered high if an attacker can influence the data sent to the SOF IPC4 topology controls. No publicly documented exploit is referenced, but the lack of a mitigated status encourages preemptive patching.

Generated by OpenCVE AI on May 6, 2026 at 13:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that incorporates the SOF IPC4 topology allocation size fix, as released by kernel.org or your distribution’s security updates.
  • Ensure that any user-space applications or drivers that interact with SOF IPC controls are also updated to versions that reference the patched kernel logic.
  • If a kernel update cannot be applied immediately, consider disabling the affected IPC topology paths or restricting access to the controls, though no official temporary workaround is provided by the vendor.

Generated by OpenCVE AI on May 6, 2026 at 13:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 13:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-122
CWE-125

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc4-topology: Correct the allocation size for bytes controls The size of the data behind of scontrol->ipc_control_data for bytes controls is: [1] sizeof(struct sof_ipc4_control_data) + // kernel only struct [2] sizeof(struct sof_abi_hdr)) + payload The max_size specifies the size of [2] and it is coming from topology. Change the function to take this into account and allocate adequate amount of memory behind scontrol->ipc_control_data. With the change we will allocate [1] amount more memory to be able to hold the full size of data.
Title ASoC: SOF: ipc4-topology: Correct the allocation size for bytes controls
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:32:19.468Z

Reserved: 2026-05-06T11:31:45.509Z

Link: CVE-2025-71286

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:27.737

Modified: 2026-05-06T13:07:51.607

Link: CVE-2025-71286

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T13:30:04Z

Weaknesses